ChandrakTrivedi
5,993 views
64 slides
Dec 25, 2016
Slide 1 of 64
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
About This Presentation
Its an open source vulnerability scanner based on Nessus. Very useful in home and small scale companies to implement and check the system, network and devices vulnerabilities.
Size: 9.32 MB
Language: en
Added: Dec 25, 2016
Slides: 64 pages
Slide Content
O peN VAS : Vulnerability Assessment Scanner By Chandrak Trivedi_101015275 Melbin Sunny_101013552 OpenVAS_Group4_Chandrak-Melbin 1
Learning Objective Understand the importance of Vulnerability Assessment (VA). Explain how OpenVAS is used for VA. Understand the logical architecture of OpenVAS framework. Conduct VA using OpenVAS. Evaluate the purpose and value of OpenVAS report. Determine how to mitigate vulnerabilities. OpenVAS_Group4_Chandrak-Melbin 2
Vulnerability Assessment (VA) What is Vulnerability Assessment (VA)? Why we n eed Vulnerability Assessment (VA)? RISK = ASSET * THREAT * VULNERABILITY OpenVAS_Group4_Chandrak-Melbin 3
OpenVAS_Group4_Chandrak-Melbin 4
OpenVAS Benefits Open Source and uses Nessus V2 as its plugin engine. Compatible with different Operating System. Keeps a history of past scans . Limitations False negatives may be reported. Determine/find less vulnerabilities as compared is Nexpose or Nessus. Requires 2-3 services to perform vulnerability assessment. OpenVAS_Group4_Chandrak-Melbin 5
An overview of OpenVAS The Open Vulnerability Assessment Scanner known more commonly as OpenVAS, is a suite of tools that work together to run tests against client computers using a database of known exploits and weaknesses. The goal is to learn about how well your servers are guarded against known attack vectors OpenVAS is be used as VULNERALABILITY ASSESSMENT tool and but also can be used as PENETRATION TESTING tool. OpenVAS_Group4_Chandrak-Melbin 6
OpenVAS Architecture Clients Services Data OpenVAS_Group4_Chandrak-Melbin 7
Clients Components OpenVAS CLI : is a set of tools that allow administration of OpenVAS through the shell. Greenbone Security Assistant : is a web-based tool with an intuitive interface for various VA that you are making. Greenbone Desktop Security : is the tool that allows us to manage everything through the GUI interface on the desktop. OpenVAS_Group4_Chandrak-Melbin 8
Services Components OpenVAS Scanner : is the component that allows us the scan of hostname/ ip , port range “from-to” or entire networks such as “192.168.1.0/28”. OpenVAS Manager : is the heart of OpenVAS , the manager receives task/information from the OpenVAS Administrator and the various administration tools CLI/WEB/GUI, then use the OpenVAS Scanner that will perform the Vulnerability Assessment. Also includes component that processes the results of the scans, so it also generates the final report . OpenVAS Administrator : is the component through which users can manage and the feed ( i.e. the updates). OpenVAS_Group4_Chandrak-Melbin 9
Data Components NVT’s : it is the container of feed , i.e. test cases that detect the vulnerabilities, which are currently over 20,000 . Results, config : is the database (PostgreSQL) where reports are collected and where the entire configuration of OpenVAS is stored. OpenVAS_Group4_Chandrak-Melbin 10
OpenVAS Feeds OpenVAS_Group4_Chandrak-Melbin 11
Conducting VA using OpenVAS OpenVAS_Group4_Chandrak-Melbin 12
Step 1: Setting up Kali for Vulnerability Scanning https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/ OpenVAS_Group4_Chandrak-Melbin 13
Step 1: Starting the OpenVAS services Once openvas -setup completes its process, the OpenVAS manager, scanner, and GSAD services should be listening : If you have already configured OpenVAS, you can simply start all the necessary services by running openvas -start . OpenVAS_Group4_Chandrak-Melbin 14
Step 1: Connecting to the OpenVAS Web Interface Point your browser to https://127.0.0.1:9392 , accept the self signed SSL certificate and plugin the credentials for the admin user. The admin password was generated during the setup phase. OpenVAS_Group4_Chandrak-Melbin 15
OpenVAS_Group4_Chandrak-Melbin 16
Step 2: Tabs Explanation of Administration Tab - Adding Users, Groups and Roles. Updating Network Vulnerability Tests (NVTs), Security Content Automation P rotocol (SCAP) and Computer Emergency Response Team (CERT) Feeds. OpenVAS_Group4_Chandrak-Melbin 17
Results of Target OpenVAS_Group4_Chandrak-Melbin 48
Step 4: Export report of VA conducted Explanation on Exporting the scanned target vulnerabilities into file. Different extension are possible to export like .pdf, .xml etc. PDF will be used to submit to your higher management. XML can be used to import in Metasploit for doing pen testing. Also you can study by just clicking the vulnerability. OpenVAS_Group4_Chandrak-Melbin 49
Exporting as file OpenVAS_Group4_Chandrak-Melbin 51
PDF file OpenVAS_Group4_Chandrak-Melbin 52
Exploitation on V ulnerable S ystem Using NVTs, CVEs and Metasploit Video on Denial of Service (DOS) on scanned results. OpenVAS_Group4_Chandrak-Melbin 53
Windows XP – No Firewall and Updates OpenVAS_Group4_Chandrak-Melbin 54
Windows XP - No Firewall and Updates OpenVAS_Group4_Chandrak-Melbin 55
VA OpenVAS_Group4_Chandrak-Melbin 56
Metasploit OpenVAS_Group4_Chandrak-Melbin 57
Metasploit OpenVAS_Group4_Chandrak-Melbin 58
OpenVAS_Group4_Chandrak-Melbin 59
Step 5: Mitigation As per references provided by OpenVAS, Patching the updates and Firewall protected. OpenVAS_Group4_Chandrak-Melbin 60
Windows XP – Firewall and Auto Updates OpenVAS_Group4_Chandrak-Melbin 61